{"id":53005,"date":"2017-06-22T07:52:31","date_gmt":"2017-06-22T11:52:31","guid":{"rendered":"https:\/\/www.cyberark.com\/sarbanes-oxley\/"},"modified":"2020-11-06T12:16:04","modified_gmt":"2020-11-06T17:16:04","slug":"sarbanes-oxley","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/es\/solutions\/audit-compliance\/sarbanes-oxley\/","title":{"rendered":"Ley Sarbanes Oxley (SOX)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1537365138136{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/mas-trm-hero.jpg?id=26780) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbSARBANES OXLEY (SOX)\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbImplemente los controles internos y los informes necesarios para cumplir la ley SOX.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bblight\u00bb][vc_btn title=\u00bbDESCARGAR MONOGR\u00c1FICO\u00bb style=\u00bbcustom\u00bb custom_background=\u00bb\u00bb custom_text=\u00bb#ffffff\u00bb shape=\u00bbsquare\u00bb link=\u00bburl:https%3A%2F%2Fwww.cyberark.com%2Fes%2Fresource%2Fprotecting-financial-information-sarbanes-oxley%2F|\u00bb el_class=\u00bbcyb-button xlarge event-click\u00bb el_id=\u00bbSOX Page: Download Whitepaper\u00bb][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1537365220235{padding-top: 2.25rem !important;padding-bottom: 2.25rem !important;}\u00bb][vc_column_text css=\u00bb.vc_custom_1538666077508{padding-bottom: 1.875rem !important;}\u00bb]<\/p>\n<p>Las empresas que tienen que cumplir la Ley Sarbanes-Oxley (SOX) se enfrentan a un desaf\u00edo sin precedentes. Aunque cumplir la Ley Sarbanes-Oxley conlleva mucho m\u00e1s que implementar tecnolog\u00edas, las soluciones de CyberArk para la protecci\u00f3n del acceso privilegiado, responsabilidad de los usuarios e informaci\u00f3n han demostrado que ofrecen las pruebas y los controles que exige el art\u00edculo 404 y ratifican los marcos de evaluaci\u00f3n interna como COSO y COBIT.<\/p>\n<p>Para garantizar la eficacia de los controles internos de los informes financieros, las empresas deben identificar y controlar los fraudes, las debilidades significativas y las deficiencias de supervisi\u00f3n interna que haya en ciclo de vida de la informaci\u00f3n relacionada con la ley Sarbanes-Oxley. Este tipo de informaci\u00f3n suele correr peligro porque hay muchos empleados con acceso privilegiado a los sistemas en los que se almacenan estos datos. Adem\u00e1s de los empleados con acceso, los ciberatacantes van a la caza de estas credenciales privilegiadas para introducirse en los sistemas cr\u00edticos de la empresa y llevarse datos.<\/p>\n<p>Las soluciones de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX, pero van m\u00e1s all\u00e1 del simple hecho de cumplir las normas para proteger la informaci\u00f3n cr\u00edtica con un enfoque de seguridad de dentro afuera que pasa a formar parte del ADN de la empresa.<\/p>\n<p>[\/vc_column_text][vc_custom_heading text=\u00bbPRINCIPALES VENTAJAS DE NUESTRA SOLUCI\u00d3N INTEGRADA.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc-6&#8243;][vc_column_text el_class=\u00bbcyb-ltr-spc-6&#8243;]<\/p>\n<ul>\n<li>Implemente controles granulares de acceso y flujos de trabajo basados en la segregaci\u00f3n de funciones<\/li>\n<li>Genere responsabilidad y unos registros de auditor\u00eda detallados e imposibles de manipular para elaborar los informes sobre la actividad privilegiada de la ley SOX<\/li>\n<li>Supervise y grabe la actividad privilegiada para recibir alertas en tiempo real o realizar an\u00e1lisis forenses<\/li>\n<li>Proteja sus datos en tr\u00e1nsito y en reposo con un repositorio seguro con m\u00faltiples capas<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1537206690510{padding-top: 2rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column width=\u00bb1\/12&#8243;][\/vc_column][vc_column width=\u00bb5\/6&#8243; css=\u00bb.vc_custom_1534353344275{padding-bottom: 1.25rem !important;}\u00bb][vc_custom_heading text=\u00bbSOLICITAR UNA DEMOSTRACI\u00d3N EN DIRECTO\u00bb font_container=\u00bbtag:h2|text_align:center|color:%23414042&#8243; use_theme_fonts=\u00bbyes\u00bb el_class=\u00bbcyb-ltr-spc-6&#8243;][\/vc_column][vc_column width=\u00bb1\/12&#8243;][\/vc_column][\/vc_row][vc_row full_width=\u00bbstretch_row\u00bb css=\u00bb.vc_custom_1537206699923{padding-bottom: 2.5rem !important;background-color: #f1f2f2 !important;}\u00bb][vc_column][vc_raw_html]W3JlcXVlc3RfZGVtb10=[\/vc_raw_html][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00bbstretch_row\u00bb content_placement=\u00bbtop\u00bb css=\u00bb.vc_custom_1537365138136{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/mas-trm-hero.jpg?id=26780) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}\u00bb el_class=\u00bbcyb-hero-section\u00bb][vc_column][vc_row_inner content_placement=\u00bbmiddle\u00bb el_class=\u00bbcyb-hero-header\u00bb][vc_column_inner el_class=\u00bbcyb-hero-header-text\u00bb][vc_custom_heading text=\u00bbSARBANES OXLEY (SOX)\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb use_theme_fonts=\u00bbyes\u00bb][vc_custom_heading text=\u00bbImplemente los controles internos y los informes necesarios para cumplir la ley SOX.\u00bb font_container=\u00bbtag:h3|text_align:left\u00bb&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":53032,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-53005","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cumplimiento de la Ley SOX: Soluciones de seguridad de CyberArk para la Ley SOX<\/title>\n<meta name=\"description\" content=\"Las soluciones de cumplimiento de la Ley Sabarnes-Oxley (SOX) de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ley Sarbanes Oxley (SOX)\" \/>\n<meta property=\"og:description\" content=\"Las soluciones de cumplimiento de la Ley Sabarnes-Oxley (SOX) de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-06T17:16:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\",\"url\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\",\"name\":\"Cumplimiento de la Ley SOX: Soluciones de seguridad de CyberArk para la Ley SOX\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"datePublished\":\"2017-06-22T11:52:31+00:00\",\"dateModified\":\"2020-11-06T17:16:04+00:00\",\"description\":\"Las soluciones de cumplimiento de la Ley Sabarnes-Oxley (SOX) de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Soluciones de Seguridad de la Identidad\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Auditor\u00eda y conformidad normativa\",\"item\":\"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Ley Sarbanes Oxley (SOX)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cumplimiento de la Ley SOX: Soluciones de seguridad de CyberArk para la Ley SOX","description":"Las soluciones de cumplimiento de la Ley Sabarnes-Oxley (SOX) de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","og_locale":"es_ES","og_type":"article","og_title":"Ley Sarbanes Oxley (SOX)","og_description":"Las soluciones de cumplimiento de la Ley Sabarnes-Oxley (SOX) de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX.","og_url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-11-06T17:16:04+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","url":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/","name":"Cumplimiento de la Ley SOX: Soluciones de seguridad de CyberArk para la Ley SOX","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"datePublished":"2017-06-22T11:52:31+00:00","dateModified":"2020-11-06T17:16:04+00:00","description":"Las soluciones de cumplimiento de la Ley Sabarnes-Oxley (SOX) de CyberArk implementan los controles internos y los informes necesarios para cumplir la ley SOX.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/sarbanes-oxley\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Soluciones de Seguridad de la Identidad","item":"https:\/\/www.cyberark.com\/solutions\/"},{"@type":"ListItem","position":3,"name":"Auditor\u00eda y conformidad normativa","item":"https:\/\/www.cyberark.com\/solutions\/audit-compliance\/"},{"@type":"ListItem","position":4,"name":"Ley Sarbanes Oxley (SOX)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53005","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/comments?post=53005"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53005\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/pages\/53032"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/media?parent=53005"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/es\/wp-json\/wp\/v2\/product_category?post=53005"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}